There is disclosed a system and method for blocking a device from a carrier network. In an embodiment, the method comprises defining an unauthorized combination filter including one or more device parameters; attaching the unauthorized combination filter to a carrier; comparing the device parameter values in the unauthorized combination filter to device parameter values stored in the device; and if the device parameter values stored in the device match the device parameter values in the unauthorized combination filter, then blocking the device from accessing the carrier network. The device parameter values stored in the device may include one or more of a device type value, a device operating system version value, and a device application version value, and the method further comprises comparing these one or more values to corresponding device parameter values defined in the unauthorized combination filter. The unauthorized combination filter may be attached to a carrier by providing a carrier identifier.
|
1. A method of blocking a mobile handheld device from accessing a carrier network, the method comprising:
storing an unauthorized combination filter comprising one or more device parameter values, the one or more device parameter values being common to a plurality of mobile handheld devices;
activating the unauthorized combination filter;
receiving a registration request from a mobile handheld device, the request comprising device parameter values;
comparing the device parameter values of the registration request with the device parameter values of the unauthorized combination filter; and
when the device parameter values of the registration request match the device parameter values of the unauthorized combination filter, blocking the mobile handheld device from accessing the carrier network.
19. A non-transitory computer readable medium storing computer readable code executable by a carrier registration and provisioning subsystem, the computer readable code implementing a method comprising:
storing an unauthorized combination filter comprising one or more device parameter values, the one or more device parameter values being common to a plurality of mobile handheld devices;
activating the unauthorized combination filter;
receiving a registration request from a mobile handheld device, the request comprising device parameter values;
comparing the device parameter values of the registration request with the device parameter values of the unauthorized combination filter; and
when the device parameter values of the registration request match the device parameter values of the unauthorized combination filter, blocking the mobile handheld device from accessing the carrier network.
11. A system for blocking a mobile handheld device from accessing a carrier network, the system comprising:
a carrier registration and provisioning subsystem, the subsystem configured to store an unauthorized combination filter comprising one or more device parameter values, the one or more device parameter values being common to a plurality of mobile handheld devices;
the subsystem further configured to activate the unauthorized combination filter;
the subsystem further configured to receive a registration request from a mobile handheld device, the request comprising device parameter values;
the subsystem further configured to compare the device parameter values of the registration request with the device parameter values of the unauthorized combination filter; and
the subsystem further configured to block the mobile handheld device from accessing the carrier network when the device parameter values of the registration request match the device parameter values of the unauthorized combination filter.
2. The method of
when the device parameter values of the registration request do not match the device parameter values of the unauthorized combination filter, allowing the mobile handheld device to access the carrier network.
3. The method of
4. The method of
5. The method of
providing an interface; and
receiving, via the interface, the device parameter values for storage.
6. The method of
7. The method of
8. The method of
subsequent to blocking the mobile handheld device from accessing the carrier network, recording a device identifier, the device identifier comprising one of an electronic serial number (“ESN”) and a product identification number (“PIN”).
9. The method of
sending an error message to the mobile handheld device.
10. The system of
send an error message to the mobile handheld device.
12. The system of
13. The system of
14. The system of
15. The system of
providing an interface; and
receiving, via the interface, the device parameter values for storage.
16. The system of
17. The system of
18. The system of
|
This application is a continuation of U.S. patent application Ser. No. 11/937,754, filed Nov. 9, 2007, the contents of which is incorporated herein by reference.
The present invention relates generally to a system and method for blocking a device from a carrier network.
Suppliers of communication services may provide various types of services that may be offered to mobile handheld device subscribers on various carriers. Such services may include, for example, electronic mail (email), voice communications, instant text messaging, Internet browsing, music downloading, and various services that may become available with the introduction of a new communication device. With the addition of new types of services and features, it may be necessary to upgrade network software versions, which may make certain devices incompatible with certain carrier networks. A solution is required to effectively manage access to a carrier network for these devices.
In the figures which illustrate exemplary embodiments:
As noted above, the present invention relates to a system and method for blocking a device from a carrier network.
Shown in
The main processor 102 may also interact with additional subsystems such as a random access memory (RAM) 106, a flash memory 108, a display 110, an auxiliary input/output (I/O) subsystem 112, a data port 114, a keyboard 116, a speaker 118, a microphone 120, short-range communications 122 and other device subsystems 124. The device 100 may be a battery-powered device and may include a battery interface 132 for receiving one or more rechargeable batteries 130 and for powering the various subsystems described above.
Operating system software used by the main processor 102 is typically stored in a persistent store such as flash memory 108. Those skilled in the art will appreciate that the operating system, specific device applications, or parts thereof, may be temporarily loaded into a volatile store such as the RAM 106.
Handheld device 100 may also include a read-only memory (ROM) 107 that may store a non-alterable electronic serial number or ESN which may be burned into ROM 107 at the time of manufacture of device 100. In addition, handheld device 100 may have a unique product identification number (PIN) stored in the ROM 107, or in another memory store in device 100.
The main processor 102, in addition to its operating system functions, enables execution of software applications 134 on the device 100. The software applications 134 may control various device features and services, and may be installed on the device 100 during its manufacture, or may be subsequently loaded onto the device 100 as a software update through one of the wireless network 200, the auxiliary I/O subsystem 112, the data port 114, the short-range communications subsystem 122, or another subsystem 124.
The software applications 134 may include, for example, various communication service modules 136 (e.g. email, instant text messaging, Internet browsing, music downloading, etc.), and a password approval module 138. The software applications 134 may also include a device service management module 137 for managing the service applications provisioned for device 100 on a carrier network. The handheld device 100 may also include a carrier network access module 139 that may be suitably adapted to manage access to a carrier network for the handheld device 100. Carrier network access module 139 will be described in more detail below. The handheld device 100 may further include a device state module 140, an address book 142, a personal information manager (PIM) 144, and various other modules 146.
Referring now to
Signals received by the antenna 214 through the wireless network 200 are input to the receiver 210, which can perform such common receiver functions as signal amplification, frequency down conversion, filtering, channel selection, and analog-to-digital (ND) conversion. ND conversion of a received signal allows more complex communication functions such as demodulation and decoding to be performed in the DSP 220. In a similar manner, signals to be transmitted are processed, including modulation and encoding, by the DSP 220. These DSP-processed signals are input to the transmitter 212 for digital-to-analog (D/A) conversion, frequency up conversion, filtering, amplification and transmission over the wireless network 200 via the antenna 216.
Now referring to
The supplier 330's network 332 may connect to a provisioning system 334 maintained by the supplier 330 and which may be appropriately configured to interact with subsystems 314, 324 provided on each of the wireless networks 200A, 200B. If connected through the Internet, for example, the connections between provisioning system 334 and subsystems 314, 324 may be by way of XML, or a web services interface. With a suitable network connection, subsystems 314 and 324 may be configured to interact with the supplier 330's provisioning system 334 to request activation, deactivation, suspension or modification of a subscriber's services on their respective wireless networks 200A, 200B.
Provisioning system 334 may maintain a database 336 of services that have been provisioned for each of the devices 100 on the wireless networks 200A, 200B of mobile carrier A 310, and mobile carrier B 320. In the database 336 of provisioning system 334, each of the devices 100 may be uniquely identified, for example, by the unique ESN burned into the ROM 107 of each device 100. Alternatively, each device 100 may be uniquely identified by the unique PIN identifier stored in ROM 107, or in another memory store in device 100. Records in database 336 may contain the unique ESN or PIN retrieved from ROM 107 or another memory store on each device 100. Each device 100 may thus be uniquely recognized by the supplier's provisioning system 334. Records in database 336 may also store information for the owning mobile carrier (e.g. mobile carrier A 310, or mobile carrier B 320), and this information may be linked to the unique ESN or PIN of device 100.
In an embodiment, each device 100 may include a carrier network access module 139 (
Now referring to
Now referring to
Now referring to
As illustrated in
Furthermore, each unauthorized combination filter 500 may include a name field 510 which contains a unique name for the unauthorized combination filter 500 (e.g. such as “6XXX Blocking Filter—Carrier A”), and which may be used to uniquely identify the unauthorized combination filter 500.
Optionally, a description field 512 may also be included to provide a more detailed description for the unauthorized combination filter 500, such as “Unauthorized combination for new network update on carrier A” in the current illustrative example. The unauthorized combination filter 500 thus defines a group or class of devices to be blocked, and may be attached to a carrier via carrier identifier 508. By mapping the unauthorized combination filter 500 to a carrier's unique identifier 508, the blocking mechanism may take affect.
While the above embodiments describe an example where the unauthorized combination filter 500 is attached to one carrier (e.g. carrier A), it will be appreciated that the unauthorized combination filter 500 may be attached to more than one carrier. As well, a carrier may have more than one unauthorized combination filter blocking more than one group or class of devices based on different filtering criteria.
Now referring to
As shown, a first mobile handheld device 610A and a second mobile handheld device 610B may be provisioned to access the carrier network of mobile carrier A shown at 310. As the first and second mobile handheld devices 610A and 610B each attempt to register through mobile carrier A's carrier network, the device parameter values in the carrier network access module 139 of each device is compared against the device parameter values in the unauthorized combination filter 500 that is attached to a mobile carrier A's subsystem 314.
For example, each of the device type values 402A and 402B may be compared against a number of unauthorized device types as defined in the unauthorized device type field 502, and each of the device OS version values 404A and 404B may be compared against a minimum OS version as defined in the unauthorized device OS version field 504.
In an embodiment, at mobile carrier A's registration and provisioning subsystem 314, if the device's device type, device OS version and device application version match the corresponding unauthorized device type, unauthorized device OS version, and unauthorized device application version fields as defined in the unauthorized combination filter 500, the device will be blocked. Thus, as shown, the first mobile handheld device 610A is successfully registered and is able to access the carrier network 200A for mobile carrier A as there is no complete match. On the other hand, when the second mobile handheld device 610B attempts to register on the carrier network 200A, it is unable to access the carrier network 200A as it is blocked by the defined unauthorized combination filter 500 attached to mobile carrier A's subsystem 314 (i.e. there is a match of the device parameters).
In another embodiment, instead of populating all of the fields of unauthorized combination filter 500, only some of the fields may be populated so that the unauthorized combination filter 500 is less specific (and thus is able to block a larger group or class of devices). As will be appreciated, by defining one or more of the unauthorized device parameters, and by attaching the defined unauthorized combination filter 500 to a carrier subsystem (e.g. mobile carrier A's subsystem 314), a group or class of devices may be blocked from accessing the carrier network, thereby allowing effective network management.
In an embodiment, when a device is unable to access the carrier network 200A, the device ESN (e.g. as may be provided in the carrier network access module 139) may be recorded for device management purposes. Thus, for example, if mobile handheld device 610B is temporarily being blocked from mobile carrier A's carrier network 200A due to an incompatibility with upgraded software on the network, the device user may be notified of the problem and instructed to seek a remedy, such as upgrading the device OS version and/or the device application version, by attaching the device to a computer attached to the Internet. Thus, the device OS version and the device application version may be updated as needed for support by a carrier network. Alternatively, the software on the network may be further updated to improve compatibility with more devices and versions.
Once the reason for blocking a group or class of devices has disappeared, the unauthorized combination filter may be detached from the carrier's registration and provisioning subsystem, such that subsequent attempts to register on the carrier network will be successful.
Now referring to
Method 700 then proceeds to block 704, where method 700 attaches the unauthorized combination filter to a carrier. By attaching the unauthorized combination filter to a carrier, the blocking function of the unauthorized combination is activated.
Next, method 700 proceeds to block 706, where method 700 compares the device parameter values in the unauthorized combination filter to the device parameter values as stored in a carrier network access module in each device.
Method 700 then proceeds to decision block 708, where method 700 determines if the device parameter values match. If yes, method 700 proceeds to block 710 where method 700 optionally sends an error message to the device to explain why the device is being blocked. Method 700 may then proceed to block 712 to block access to the carrier network and prevent the device from registering. Method 700 then ends.
If at decision block 708 the answer is no, then method 700 proceeds to block 714 where method 700 permits access to the carrier network and allows the device to function normally. Method 700 then ends.
Thus, in an aspect, there is provided a method of blocking a mobile handheld device from a carrier network, comprising: defining an unauthorized combination filter including one or more device parameters; attaching the unauthorized combination filter to a carrier registration subsystem; comparing the device parameter values in the unauthorized combination filter to device parameter values stored in the device; and if the device parameter values stored in the device match the device parameter values in the unauthorized combination filter, then blocking the device from accessing the carrier network.
In an embodiment, the device parameter values stored in the device include one or more of a device type value, a device operating system version value, and a device application version value, and the method further comprises comparing these one or more values to corresponding device parameter values in the unauthorized combination filter.
In another embodiment, the device is blocked from accessing the carrier network if a combination of a device type value, a device operating system version value, and a device application version value is matched.
In another embodiment, the method further comprises sending an error message to the device upon blocking to explain the reason for the block.
In another embodiment, the method further comprises retrieving and storing the ESN or PIN for each blocked device.
In another embodiment, attaching the unauthorized combination filter to a carrier comprises providing a carrier identifier and attaching the unauthorized combination filter to a carrier's registration subsystem.
In another embodiment, the method further comprises detaching the unauthorized combination filter from the carrier registration subsystem; and permitting any previously blocked devices to access the carrier network.
In another aspect, there is provided a system for blocking a mobile handheld device from a carrier network, comprising: processing means adapted to define an unauthorized combination filter including one or more device parameters; processing means adapted to attach the unauthorized combination filter to a carrier registration subsystem; processing means adapted to compare the device parameter values in the unauthorized combination filter to device parameter values stored in the device; and processing means adapted to compare the device parameter values in the device with one or more device parameter values in the unauthorized combination filter, and to block the device from accessing the carrier network if the device parameter values match.
In an embodiment, the device parameter values stored in the device include one or more of a device type value, a device operating system version value, and a device application version value, and the system further comprises processing means adapted to compare these one or more values to corresponding device parameter values in the unauthorized combination filter.
In an embodiment, the device is blocked from accessing the carrier network if a combination of a device type value, a device operating system version value, and a device application version value is matched.
In an embodiment, the system further comprises processing means adapted to send an error message to the device upon blocking to explain the reason for the block.
In another embodiment, the system further comprises processing means adapted to retrieve and storing the ESN or PIN for each blocked device.
In another embodiment, the processing means for attaching the unauthorized combination filter to a carrier comprises processing means adapted to provide a carrier identifier and to attach the unauthorized combination filter to a carrier's registration subsystem.
In another embodiment, the system further comprises: processing means adapted to detach the unauthorized combination filter from the carrier registration subsystem; and processing means adapted to permit any previously blocked devices to access the carrier network.
In another aspect, there is provided a data processor readable medium storing data processor code that when loaded onto a carrier registration subsystem adapts the subsystem to block a mobile handheld device from a carrier network, the data processor readable medium comprising: code for defining an unauthorized combination filter including one or more device parameters; code for attaching the unauthorized combination filter to a carrier registration subsystem; code for comparing the device parameter values in the unauthorized combination filter to device parameter values stored in the device; and code for blocking the device from accessing the carrier network if the device parameter values stored in the device match the device parameter values in the unauthorized combination filter.
In an embodiment, the device parameter values stored in the device include one or more of a device type value, a device operating system version value, and a device application version value, and the data processor readable medium further comprises code for comparing these one or more values to corresponding device parameter values in the unauthorized combination filter.
In another embodiment, the data processor readable medium further comprises code for blocking the device from accessing the carrier network if a combination of a device type value, a device operating system version value, and a device application version value is matched.
In another embodiment, the data processor readable medium further comprises code for sending an error message to the device upon blocking to explain the reason for the block.
In another embodiment, the data processor readable medium further comprises code for retrieving and storing the ESN or PIN for each blocked device.
In another embodiment, the data processor readable medium further comprises code for attaching the unauthorized combination filter to a carrier comprises code for providing a carrier identifier and code for attaching the unauthorized combination filter to a carrier's registration subsystem.
While illustrative embodiments have been described above, it will be appreciated that various changes and modifications may be made. More generally, the scope of the invention is defined by the following claims.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
7194507, | Jun 29 2000 | NTT DoCoMo, Inc | Method and apparatus for setting communication parameter in information terminal |
7293282, | Jul 03 2003 | Time Warner Cable Enterprises LLC | Method to block unauthorized access to TFTP server configuration files |
7919085, | Dec 18 2001 | INSTITUT NATIONAL DE LA SANTE ET DE LA RECHERCHE MEDICALE | Means for the diagnosis and therapy of CTCL |
20040198319, | |||
20050005154, | |||
20090254678, | |||
20110116442, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Nov 08 2007 | HUYNH, TRAN HOANG | Research In Motion Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 025844 | /0093 | |
Feb 22 2011 | Research In Motion Limited | (assignment on the face of the patent) | / | |||
Jul 09 2013 | Research In Motion Limited | BlackBerry Limited | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 037893 | /0239 | |
May 11 2023 | BlackBerry Limited | Malikie Innovations Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 064104 | /0103 | |
May 11 2023 | BlackBerry Limited | Malikie Innovations Limited | NUNC PRO TUNC ASSIGNMENT SEE DOCUMENT FOR DETAILS | 064270 | /0001 |
Date | Maintenance Fee Events |
Oct 12 2015 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Oct 10 2019 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Oct 10 2023 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Apr 10 2015 | 4 years fee payment window open |
Oct 10 2015 | 6 months grace period start (w surcharge) |
Apr 10 2016 | patent expiry (for year 4) |
Apr 10 2018 | 2 years to revive unintentionally abandoned end. (for year 4) |
Apr 10 2019 | 8 years fee payment window open |
Oct 10 2019 | 6 months grace period start (w surcharge) |
Apr 10 2020 | patent expiry (for year 8) |
Apr 10 2022 | 2 years to revive unintentionally abandoned end. (for year 8) |
Apr 10 2023 | 12 years fee payment window open |
Oct 10 2023 | 6 months grace period start (w surcharge) |
Apr 10 2024 | patent expiry (for year 12) |
Apr 10 2026 | 2 years to revive unintentionally abandoned end. (for year 12) |